Home
last modified time | relevance | path

Searched refs:attach_flags (Results 1 – 22 of 22) sorted by relevance

/linux-6.12.1/tools/bpf/bpftool/
Dcgroup.c285 __u32 attach_flags; in show_attached_bpf_progs() local
287 attach_flags = prog_attach_flags[iter] ?: p.attach_flags; in show_attached_bpf_progs()
289 switch (attach_flags) { in show_attached_bpf_progs()
300 snprintf(buf, sizeof(buf), "unknown(%x)", attach_flags); in show_attached_bpf_progs()
548 int attach_flags = 0; in do_attach() local
577 attach_flags |= BPF_F_ALLOW_MULTI; in do_attach()
579 attach_flags |= BPF_F_ALLOW_OVERRIDE; in do_attach()
586 if (bpf_prog_attach(prog_fd, cgroup_fd, attach_type, attach_flags)) { in do_attach()
Dnet.c583 __u32 attach_flags; in query_flow_dissector() local
597 &attach_flags, prog_ids, &prog_cnt); in query_flow_dissector()
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/
Dcgroup_attach_multi.c79 __u32 prog_ids[4], prog_cnt = 0, attach_flags, saved_prog_id; in serial_test_cgroup_attach_multi() local
160 BPF_F_QUERY_EFFECTIVE, &attach_flags, in serial_test_cgroup_attach_multi()
163 CHECK_FAIL(attach_flags != 0); in serial_test_cgroup_attach_multi()
169 BPF_F_QUERY_EFFECTIVE, &attach_flags, in serial_test_cgroup_attach_multi()
274 BPF_F_QUERY_EFFECTIVE, &attach_flags, in serial_test_cgroup_attach_multi()
277 CHECK_FAIL(attach_flags != 0); in serial_test_cgroup_attach_multi()
Dtc_helpers.h54 __u32 count = 0, attach_flags = 0; in __assert_mprog_count() local
57 err = bpf_prog_query(ifindex, target, 0, &attach_flags, in __assert_mprog_count()
Dcgroup_attach_autodetach.c26 __u32 duration = 0, prog_cnt = 4, attach_flags; in serial_test_cgroup_attach_autodetach() local
59 if (CHECK(bpf_prog_query(cg, BPF_CGROUP_INET_EGRESS, 0, &attach_flags, in serial_test_cgroup_attach_autodetach()
Dcgroup_link.c41 __u32 prog_ids[ARRAY_SIZE(cgs)], prog_cnt = 0, attach_flags, prog_id; in serial_test_cgroup_link() local
76 0, &attach_flags, NULL, &prog_cnt); in serial_test_cgroup_link()
78 CHECK_FAIL(attach_flags != BPF_F_ALLOW_MULTI); in serial_test_cgroup_link()
Dsockmap_basic.c412 __u32 attach_flags = 0; in test_sockmap_progs_query() local
428 &attach_flags, prog_ids, &prog_cnt); in test_sockmap_progs_query()
430 ASSERT_EQ(attach_flags, 0, "wrong attach_flags on query"); in test_sockmap_progs_query()
439 &attach_flags, prog_ids, &prog_cnt); in test_sockmap_progs_query()
441 ASSERT_EQ(attach_flags, 0, "wrong attach_flags on query"); in test_sockmap_progs_query()
Dunpriv_bpf_disabled.c157 __u32 attach_flags = 0; in test_unpriv_bpf_disabled_negative() local
204 ASSERT_EQ(bpf_prog_query(prog_fd, BPF_TRACE_FENTRY, 0, &attach_flags, prog_ids, in test_unpriv_bpf_disabled_negative()
Dsk_lookup.c459 __u32 attach_flags = 0; in query_lookup_prog() local
483 &attach_flags, prog_ids, &prog_cnt); in query_lookup_prog()
490 if (CHECK(attach_flags != 0, "bpf_prog_query", in query_lookup_prog()
491 "wrong attach_flags on query: %u", attach_flags)) in query_lookup_prog()
Dtc_opts.c2567 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target()
2585 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target()
2614 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target()
2643 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target()
2671 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target()
2699 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target()
2713 attr.query.attach_flags = 0; in test_tc_opts_query_target()
2720 attr.query.attach_flags = 1; in test_tc_opts_query_target()
/linux-6.12.1/drivers/media/rc/
Dbpf-lirc.c253 if (attr->attach_flags) in lirc_prog_attach()
273 if (attr->attach_flags) in lirc_prog_detach()
327 if (copy_to_user(&uattr->query.attach_flags, &flags, sizeof(flags))) { in lirc_prog_query()
/linux-6.12.1/kernel/bpf/
Dtcx.c25 if (attr->attach_flags & BPF_F_REPLACE) { in tcx_prog_attach()
40 attr->attach_flags, attr->relative_fd, in tcx_prog_attach()
78 ret = bpf_mprog_detach(entry, &entry_new, prog, NULL, attr->attach_flags, in tcx_prog_detach()
Dmprog.c408 if (attr->query.query_flags || attr->query.attach_flags) in bpf_mprog_query()
414 if (copy_to_user(&uattr->query.attach_flags, &flags, sizeof(flags))) in bpf_mprog_query()
Dnet_namespace.c260 if (copy_to_user(&uattr->query.attach_flags, &flags, sizeof(flags))) in __netns_bpf_prog_query()
305 if (attr->target_fd || attr->attach_flags || attr->replace_bpf_fd) in netns_bpf_prog_attach()
Dcgroup.c1082 if (copy_to_user(&uattr->query.attach_flags, &flags, sizeof(flags))) in __cgroup_bpf_query()
1158 if ((attr->attach_flags & BPF_F_ALLOW_MULTI) && in cgroup_bpf_prog_attach()
1159 (attr->attach_flags & BPF_F_REPLACE)) { in cgroup_bpf_prog_attach()
1168 attr->attach_type, attr->attach_flags); in cgroup_bpf_prog_attach()
Dsyscall.c4053 if (attr->attach_flags & ~BPF_F_ATTACH_MASK_MPROG) in bpf_prog_attach()
4056 if (attr->attach_flags & ~BPF_F_ATTACH_MASK_BASE) in bpf_prog_attach()
4128 if (attr->attach_flags & ~BPF_F_ATTACH_MASK_MPROG) in bpf_prog_detach()
4135 } else if (attr->attach_flags || in bpf_prog_detach()
/linux-6.12.1/tools/lib/bpf/
Dbpf.c666 attr.attach_flags = flags | BPF_F_ID; in bpf_prog_attach_opts()
669 attr.attach_flags = flags; in bpf_prog_attach_opts()
703 attr.attach_flags = flags | BPF_F_ID; in bpf_prog_detach_opts()
706 attr.attach_flags = flags; in bpf_prog_detach_opts()
952 OPTS_SET(opts, attach_flags, attr.query.attach_flags); in bpf_prog_query_opts()
960 __u32 *attach_flags, __u32 *prog_ids, __u32 *prog_cnt) in bpf_prog_query() argument
971 if (attach_flags) in bpf_prog_query()
972 *attach_flags = opts.attach_flags; in bpf_prog_query()
Dbpf.h588 __u32 attach_flags; /* output argument */ member
617 __u32 query_flags, __u32 *attach_flags,
/linux-6.12.1/drivers/net/
Dnetkit.c535 if (attr->attach_flags & BPF_F_REPLACE) { in netkit_prog_attach()
545 attr->attach_flags, attr->relative_fd, in netkit_prog_attach()
579 ret = bpf_mprog_detach(entry, &entry_new, prog, NULL, attr->attach_flags, in netkit_prog_detach()
/linux-6.12.1/net/core/
Dsock_map.c73 if (attr->attach_flags || attr->replace_bpf_fd) in sock_map_get_from_fd()
92 if (attr->attach_flags || attr->replace_bpf_fd) in sock_map_prog_detach()
1590 if (copy_to_user(&uattr->query.attach_flags, &flags, sizeof(flags)) || in sock_map_bpf_prog_query()
/linux-6.12.1/include/uapi/linux/
Dbpf.h1597 __u32 attach_flags; member
1655 __u32 attach_flags; member
/linux-6.12.1/tools/include/uapi/linux/
Dbpf.h1597 __u32 attach_flags; member
1655 __u32 attach_flags; member